Please use this identifier to cite or link to this item:
http://dspace.dtu.ac.in:8080/jspui/handle/repository/18820
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | MITTAL, SHREEYA | - |
dc.date.accessioned | 2022-02-21T08:29:57Z | - |
dc.date.available | 2022-02-21T08:29:57Z | - |
dc.date.issued | 2020-10 | - |
dc.identifier.uri | http://dspace.dtu.ac.in:8080/jspui/handle/repository/18820 | - |
dc.description.abstract | In the present world huge amounts of data are stored and transferred from one location to another. The data when transferred or stored is primed exposed to attack. Although various techniques or applications are available to protect data, loopholes exist. The role of Intrusion Detection System (IDS) has been inevitable in the area of Information and Network Security – especially for building a good network defense infrastructure. Anomaly based intrusion detection technique is one of the building blocks of such a foundation. Thus to analyze data and to determine various kind of attack, data mining techniques have emerged to make it less vulnerable. Anomaly detection uses these data mining techniques to detect the surprising behavior hidden within data increasing the chances of being intruded or attacked. Various hybrid approaches have also been made in order to detect known and unknown attacks more accurately. This paper presents a number of anomaly detection techniques that have been presented by various researchers. | en_US |
dc.language.iso | en | en_US |
dc.publisher | DELHI TECHNOLOGICAL UNIVERSITY | en_US |
dc.relation.ispartofseries | TD - 5352; | - |
dc.subject | INTRUSION DETECTION SYSTEM (IDS) | en_US |
dc.subject | DATA MINING TECHNIQUES | en_US |
dc.subject | ANOMALY DETECTION | en_US |
dc.subject | HYBRID APPROACHES | en_US |
dc.title | ANOMALY DETECTION TECHNIQUES | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | M.E./M.Tech. Computer Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Shreeya Thesis.pdf | 770.64 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.